TRY & TRY U WILL BE SUCCESS Fundamentals Of Networking SANJAY HIRANI Semester: 4th Branch:MCA Fundamentals of Networking (SANJAY HIRANI) Page 1 TRY & TRY U WILL BE SUCCESS CH-1 INTRODUCTION TO COMPUTER NETWORK 1) Disadvantage of Layering? Reduced Speed and Performance Increased Memory Usage 2) The TCP/IP & OSI layering Models. The OSI Layering mechanism was designed by Open System interconnection Fundamentals of Networking (SANJAY HIRANI) Page 2 TRY & TRY U WILL BE SUCCESS CH-2 NETWORK FUNDAMENTALS 2.1) 2.2) Network Categories Networks can be categorized based on their scope, Connection type, Communication mechanism, and usage important Fundamentals related to networks. 2.1.1) Division Based on Scope 2.1.1.1) Personal Area Networks (PAN) 2.1.1.2) Local Area Networks (LAN) 2.1.1.3) Metropolitan Area Networks (MAN 2.1.1.4) Wide Area Networks (WAN) 2.1.1.5) Internetworks 2.1.2) Division Based on Connection 2.1.2.1) Wired Networks 2.1.2.2) Wireless Networks 2.1.3) Division Based on Communication Type 2.1.3.1) Broadcast Network 2.1.3.2) Point - to - Point Networks 2.1.4) Division Based on Usage 2.1.4.1) Home Networks 2.1.4.2) Sensor Networks The Protocols 2.2.1) 2.2.2) 2.2.3) 2.2.4) 2.3) the Standardization Bodies Connection and Protocol Connectionless and Connection-Oriented Protocols layers and Protocols Application of Computer Networks 2.3.1) Home Networking Application 2.3.2) Mobile Networking Application 2.3.3) Wireless Networking Application Fundamentals of Networking (SANJAY HIRANI) Page 3 TRY & TRY U WILL BE SUCCESS 2.4) Network Components 2.4.1) the Network Interface Card 2.4.2) Cable for Wired Connection 2.4.3) Frequency band For Wireless Transmission 2.4.4) the Servers and the Nodes 2.5.5) Interconnecting Devices Hub Switch Repeater Bridge Router Fundamentals of Networking (SANJAY HIRANI) Page 4 TRY & TRY U WILL BE SUCCESS CH-3 DATA COMMUNICATION FUNDAMENTALS 3.1) Analog and Digital Transmission 3.4.1) Introduction to Transmission 3.4.2) Analog Transmission 3.4.3) Digital Transmission 3.2) Modulation 3.2.1) Amplitude Modulation 3.2.2) Frequency Modulation 3.2.3) Phase Modulation 3.3) Analog & Digital Signal 3.3.1) Analog Signal 3.3.2) Digital Signal Fundamentals of Networking (SANJAY HIRANI) Page 5 TRY & TRY U WILL BE SUCCESS CH-4 The Physical layer 1) The Duties of Physical Layer 1.1) Machine Port Level Addressing 1.2) Transferring Bits 1.3) Synchronization the Sender & Receiver 1.4) Multiplexing Multiple Data Streams 1.5) Inappropriateness of FDM & TDM for Bursty data 1.6) The Electromagnetic Spectrum 1.7) Radio Waves 1.8) Microwaves 2) Wired Physical Layer 2.1) the UTP (Unshielded Twisted Pair) Cable 2.2) Fiber Optic Cables 2.3) the Total Internal Reflection Principle 2.4) Design of Fiber Cables 2.5) Sending & Receiving Devices 3) Wireless Physical Layer 3.1) Hidden & Exposed System 3.2) Hidden & Exposed Station Solution (RTS & CTS) 3.3) Components of the Wireless System 3.4) Antennas 3.5) Access Points 3.6) Wireless LAN 3.7) the 802.11 Standard 3.8) Ad-hoc & Infrastructure Modes 3.9) 802.11 Physical Layer 3.10) Wireless Communication using Satellite 4) Three Different Orbits 4.1) GEO- Geosynchronous Earth Orbit 4.2) LEO-Lower Earth Orbit 4.3) MEO- Medium Earth Orbit Fundamentals of Networking (SANJAY HIRANI) Page 6 TRY & TRY U WILL BE SUCCESS CH-5 The Data Link layer 1. The Duties of Data Link Layer 1.1) the No Monopoly Idea & Framing 1.2) Framing Techniques Framing using Byte and Stuff using Byte Stuffing Framing by Flag Byte and Bit Stuffing Framing by Using Illegal Combinations Character Count with Other Methods 2. Error Detection & Error Correction 2.1) Checksum (Detection & Correction) 2.2) CRC (Cyclic Redundancy Check) (Detection) 2.3) Modulo-2 Arithmetic – LRC (Detection) 3. The Protocols 3.1) the Sender & Receiver Concept 3.2) the Acknowledgement 3.3) Timers & the Time Out Event 3.4) the Sending & Receiving windows 3.5) the Sequence & Acknowledgement Numbers 3.6) Retransmission 3.7) Duplicate Frames 3.8) Go Back N 3.9) Selective Repeat Fundamentals of Networking (SANJAY HIRANI) Page 7 TRY & TRY U WILL BE SUCCESS CH-6 The Medium Access Sublayer 1) Introduction The Medium Access Sublayer 1.1) Shared Channel Concept 1.2) Collision Detection & Avoidance 1.3) Channel Acquisition issues 1.4) Ad-hoc & Infrastructure Modes 2) Wired MAC layer 2.1) Prerequisites to Ethernet, ALOHA and Slotted ALOHA 2.2) the Ethernet 2.1.1) Classic Ethernet 2.1.2) Ethernet Technology 2.1.3) Cascaded Star Topology 2.1.4) Frame Structure 2.1.5) Using Switch Instead of Hubs 2.1.6) The Binary Exponential Back-off Algorithm 2.1.7) Limitations of CSMA/CD 2.3) Fast Ethernet 2.4) Gigabit Ethernet 2.5) Virtual LAN Fundamentals of Networking (SANJAY HIRANI) Page 8 TRY & TRY U WILL BE SUCCESS CH-7 The Network Layer 1) Duties Of Network layer 1.1) Routing 1.2) Accounting 1.3) Receive Service from the Data Link layer 1.4) Provide Service to the Transport layer 1.5) Global Machine Level Addresing 1.5.1) Classful Addressing 1.5.2) The Dotted Decimal Notation 1.5.3) Classless Addressing 1.5.4) Unique Address Requirement 1.5.5) Network Address Translation 1.5.6) The Real Solution, IPv6 1.6) Multiplexing and Demultiplexing Multiple Transport layer Connections 1.7) Multiplexing and Demultiplexing Multiple Transport layer Connections 2) Routing Algorithms 2.1) Requirements of a Good Routing Algorithms Dynamism and Flexibility Performance Issues in router’s Performance Functions of a Router Lookup Switching Queuing Robustness 2.2) Internal & External Routing Algorithms 2.3) Distance Vector Routing Construction of Routing Tables The Count –to-Infinity Problem Solution Count –to-Infinity Problem Problem with count-to-infinity Fundamentals of Networking (SANJAY HIRANI) Page 9 TRY & TRY U WILL BE SUCCESS 2.4) Link State Routing Finding Neighbours & delay Sequence Number and Age Fields Routing Table Construction The Optimality Principle 2.5) Routing in MANet No special Purposes Routers No fixed topology Best path Assumptions Power Requirement Security issues Ad-hoc On-demand Distance Vector Route Discovery Operation Route Maintenance 2.6) Border Gateway Protocol BGP & DV Path vector Routing No Count-to-infinity Complexity Impact of Business relationship The BGP operation Local Preference Avoiding False Alarms Check the Willingness to be an Intermediary Hot Potato Interior Routing 3) Congestion Control Algorithms o Admission Control o Prevention of Congested Routes o Global Synchronization & Random Early Discard o Jitter Control Fundamentals of Networking (SANJAY HIRANI) Page 10 TRY & TRY U WILL BE SUCCESS CH-8 The Transport Layer 1) Duties of the Transport Layer Retransmission Adapted retransmission time according to load Ordered Delivery Optimum Utilization of bandwidth Flow Control Real-Time Delivery Quality of Delivery 1.1) Multiplexing Demultiplexing and Port Numbers 1.2) Service to the Application Layer 1.3) Shortcomings of transport Layers of the Internet End to end Security End to End Specified quality of Service Isochronous Property Additional Security measures 1.4) Process-level Addressing 1.5) Providing End to end Solutions Flow Control Managing Multiple Connections Dynamically Timer Management Retransmission, RTT, and Timeout Calculations Timers Connection Establishment Retransmission Delayed ACK Persist Keepalive Fin-wait-2 Time-Wait 2) Connection Management at the Transport Layer 2.1) Delayed Duplicates Time of reach the destination is variable Fundamentals of Networking (SANJAY HIRANI) Page 11 TRY & TRY U WILL BE SUCCESS A delayed segment can be assumed lost ACKs can also be delayed Problems caused by delayed Duplicates A unique sequence number for each segment TCP Sequence numbers Size of Sequence number field Keep a track of obsolete sequence numbers What if the machine goes down? Choose a better initial sequence number Clock rate and speed of sending Desirable properties of a clock Delayed duplicates and connection establishment 2.2) Connection Establishment Identifying duplicate CRs and ACKs Assigning unique Connection IDs Limiting the segment lifetime 2.3) The Three-way Handshake 2.4) Connection Establishment in TCP 2.5) The Connection Release Symmetric and asymmetric connection close The Two-army Problem 3) Congestion Control 3.1) Detecting Congestions Implicit Method Explicit Method 3.2) Reacting to Congestion using RED (Random Early Discard) Tail drop and RED Dropping packets before the queue become full Determining the value of p 3.3) Fast Recovery MDCA & AIMD 3.4) Flow Control Fundamentals of Networking (SANJAY HIRANI) Page 12 TRY & TRY U WILL BE SUCCESS CH-9 The Application Layer 1) Domain Name System 1.1) The Domain Namespaces Advantages of Hierarchy The Distributed Database Search Mechanism and name Resolution The Zone 1.2) The Registration Process 1.3) The Name Servers 1.4) Resource Records 1.5) Different Types of Resource Records 1.6) Dynamic DNS The DNSSes DNS Poisoning 2) World Wide Web 2.1) The HTTP Query and Response 2.2) The Structure Of The Query Response 2.3) Other Method to Query the Server 2.4) Persistent Connection HTPP 1.1 The Persist Connection Pipelining 2.5) Cookies 2.6) Session Variables 2.7) The Condition Download 2.8) Proxies as Intermediaries 2.9) Dynamic Web Server Side Client Side 3) Bluetooth 3.1) Bluetooth architecture o Pairing Fundamentals of Networking (SANJAY HIRANI) Page 13 TRY & TRY U WILL BE SUCCESS 3.2) Bluetooth Application 3.3) Bluetooth Profile o Bluetooth Protocol Stack 3.4) Bluetooth Radio layer 3.5) Bluetooth Baseband Layer 3.6) Bluetooth L2CAP layer 3.7) Bluetooth Frame Structure 3.8) Bluetooth pairing process Fundamentals of Networking (SANJAY HIRANI) Page 14 TRY & TRY U WILL BE SUCCESS KEYWORDS 1) ATM- Asynchronous Transfer Mode 2) SMTP- Simple mail Transfer protocol 3) TCP/IP- Transmission Control Protocol/ Internet Protocol 4) OSI- Open System Interconnection 5) RFC- Recommendation For Comments 6) GUI- Graphical User Interface 7) NIC- Network Interface Card 8) IEEE- Institute of Electrical and Electronics Engineers 9) UDP- User Datagram Protocol 10) MANets- Mobile Ad hoc Networks 11) FDM- Frequency Division Multiplexing 12) TDM- Time Division Multiplexing 13) QAM- Quadrature Amplitude Modulation 14) ADSL- Asymmetric Digital Subscriber Line 15) OFDM- Orthogonal Frequency Division Multiplexing 16) CDMA- Code Division Multiple Access 17) ISM-Industrial Scientific & Medical 18) FSO-Free Space Optics 19) CTS- Clear to Send 20) DSL- Digital Subscriber Line 21) RTS- Request to Send 22) BSS- Basic Services Set 23) DSS- Distributed Services Set 24) EIFS- Extended interframe Spacing 25) SIFS- Small interframe Spacing 26) PCF- Point Coordinated Functioning 27) DCF- Distributed Coordinated Functioning 28) LLC- logical Link Control 29) ECN- Explicit Congestion Notification 30) FEC- Forward Equivalence Class 31) ICMP- Internet Control Message Protocol 32) CRC- Cyclic Redundancy Check Fundamentals of Networking (SANJAY HIRANI) Page 15 TRY & TRY U WILL BE SUCCESS GTU SHORT QUESTION PAPER-1 (15-05-2012) 1) Distributed System A Distributed System Consists of a Collection of autonomous Computers, Connected through a network and Distribution middleware, which enables computers to coordinate their activities and to share the resource of the System, so that users perceive as a single, integrated computing facility. 2) Flow Control The Data Link Layer deals with two entities directly connected to each other. There is no restriction on somebody being a sender and somebody else being a receiver. E.g: The First case involves downloading songs from the internet to a mobile phone. 3) Harmonic A harmonic is a signal or wave whose frequency is an integral (wholenumber) multiple of the frequency of some reference signal or wave. The term can also refer to the ratio of the frequency of such a signal or wave to the frequency of the reference signal or wave. 4) Asynchronous Digital Subscriber Line ADSL is a technology for transmitting digital information at a high bandwidth on existing phone lines to homes and businesses. ADSL is asymmetric in that in uses most of the channel to transmit downstream to the user and only a small part to receive information from the user. 5) Stop and Wait Stop-n-wait (sometimes known as “positive acknowledgement with retransmission”) is the fundamental technique to provide reliable transfer under unreliable packet deleivery systems 6) Selective Repeat When the receiver window is large enough to hold more than one frames This technique is known as Selective Repeat The Receiver now has a large buffer which can accommodate multiple out of order frames. Fundamentals of Networking (SANJAY HIRANI) Page 16 TRY & TRY U WILL BE SUCCESS 7) Four Service Classes in 802.16 Unsolicited grant service(UGS) Real-Time Polling Service(RTPS) Non-Real Time polling Service(NRTPS) Best effort service(BE) 8) Replay Attack A replay attack is a from of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed 9) Flag Byte Each frame starts and with special bytes: flag bytes. Two consecutive flag bytes indicate end of frame and beginning on new frame. 10) Admission Control Admission Control is validation process in communication systems where a check is performed before a connection is established to see if current resources are sufficient for the proposed connection 11) POP3 Server In the simplest implementations of POP3, the server really does maintain a collection of text files one for each e-mail account. When a message arrives , the PPO3 server simply appends it to the bottom of the recipient’s file 12) Privacy Amplification The transformation from the original one-time pad to different one that reduces Trudy’s knowledge is called privacy amplification 13) Home application Example Computers, TV Connected to the internet by cable, DSL, Wireless, etc. 14) Example of Frequency Division Multiplexing Radio and Television transmission 15) Error Correcting Code Include enough redundancy to detect and correct errors. 16) Example Piggy Backing A person uses their neighbor’s wi-fi without their permission 17) Hidden Station Problem You must have noticed that both the problems are due to single reason. Fundamentals of Networking (SANJAY HIRANI) Page 17 TRY & TRY U WILL BE SUCCESS Whenever the sender senses the channel it senses its surrounding Receiver surrounding for any activity. A busy surrounding at the sender and a free Surrounding at the receiver generates the Exposed Station Problem. 18) Example Delayed Duplicate Sorting the Disk files 19) Example Substitution Cipher Attack becomes DWWDFN 20) Dividing networking stacks in layers In OSI model, a networking system was divided into layers. Within each layer, one or more entities implement its functionality, each entity interacted directly only with the layer immediately beneath it, and provided facilities for use by the layer above it. 21) Active and Passive repeater Active repeaters feed power as well as converting the week signal into its original form passive repeaters act as assort of a reflector only. 22) List four business needs of a network Flexibility/ Scalability Functionality/Speed Manageability Security 23) List four home requirement of a network Modem Residential gateway Network bridge Network Hub/Switch 24) Write one reason for home networks no gaining popularity as they should One reason for home networks no gaining popularity as they should is Network is too slow. 25) Name any two types of wireless networks prevalent in the market 1) Flying LAN 2) Individual mobile Computers 26) Write the difference between peer to peer vs. client server model Fundamentals of Networking (SANJAY HIRANI) Page 18 TRY & TRY U WILL BE SUCCESS The difference between peer to peer vs. client server model is the fact that a peer to peer network has no central server. Within a peer to peer network all the computers are interconnected and can communicate, but each one stores its own files and runs its own programs and applications 27) Differentiate between broadcast and point to point networks Broadcast networks 1) Broadcast Networks uses LAN Full mesh WAN Point to Point Networks 1) Point to point Network uses PPP, HDLC, partial mesh WAN 2) Broadcast means you sent digital signals to any device connected to a networks 3) Point to point means send digital signals from a specific point to a specific point(Identify by IP address or MAC address) 28) Write two reasons why OSI model and TCP/IP model succeeded OSI did not take off is because it was a complete set of specifications that was never subjected to any real implementations worth mentioning. The OSI model is may be complete and too complex. The gap between the concrete use(implementations) and the model is sometimes significant indeed, few programs can use or wrongly use the 7 layers of the model: the session and presentations layers are hardly used an contrary the data link and networks layers are often split into several sub-layers. 29) DMT: Discrete Multi Tone 30) List two types of frames needed by 802.16 A generic frame A bandwidth request frame 31) Write any two reasons for introducing 802.16 even when 802.16 was round and successful 802.16 included mobility (Latest Standard) It proved useful in case of calamities 32) Write the amount of bandwidth offered by fast Ethernet The amount of bandwidth offered by fast Ethernet is 10 Mbps 33) ARQ: Automatic Repeat request Fundamentals of Networking (SANJAY HIRANI) Page 19 TRY & TRY U WILL BE SUCCESS PAPER-2 (16-05-2011) 1) What is the need for MIME? MIME was needed to overcome the limitations of SMTP mentioned belo: SMTP can not transfer executable files and binary objects SMTP services may reject mails having size greater than a certain size SMTP cannot handle non-textual data such as pictures , images, and video 2) What is the need for DNS in the Internet? DNS automatically converts the names we type in our web browser address bar to IP address of web servers hosting those sites DNS implements a distributed database to store this name and address information for all public hosts on the Internet 3) Mention uses of a computer network. Use of Computer Networks 1) Communication and Access to Information 2) Resource Sharing 3) Centralized Support and Administration 4) What is meant by : a) WAN b) PAN WAN (Wide Area Network) spans a large geometric area, such as a state, province a country. WANs often multiple smaller networks, such as local area network(LANs) or MANs PAN: A Personnel area networks is a computer organized around an individual person. Personal area networks typically involve a mobile computer, a cell phone and/or a computing device such a PDA 5. Differentiate between half duplex and full duplex channel. Half Duplex is used to describe communication where only one side can talk at a time Full duplex is used to describe communication where both side are able to send and receive data at the same time. 6. What is the major difference between a hub and a switch? A Hub is a networking device that allows one to connect multiple PCs to a single network Switch is a computer networking device that connects network segments Fundamentals of Networking (SANJAY HIRANI) Page 20 TRY & TRY U WILL BE SUCCESS 7. What is meant by security by obscurity? Security Through Obscurity(STO) is the belief that s system of any sort can be secure so long as nobody outside of its implementation group is allowed to find out anything about its internal mechanisms Hiding account passwords in binary files or script with the presumption that “nobody will ever find it” is a prime case of STO. 8. Differentiate between symmetric and asymmetric ciphers. In a symmetric, the key that deciphers the cipher text is the same as (or can be easily derived from) the key encipher the clear text. This key is often referred to as the secret key In an asymmetric cipher uses two keys: one keys that is kept secret and known to only one person (the private key) and another key that is public and available to everyone the two key are mathematically interrelated, but it’s impossible it drive one key from the other. 9. Differentiate between routing process and forwarding process. Routing process is the process by which the forwarding table is built and maintained Forwarding process is the process of moving packets input to output 11. What is the major drawback of Single Bit Parity check method for error detection? The major disadvantage of this method is that it is able to detect burst error if number of bits change are even i.e. if 2,4,6,8..etc 12. What is the use of acknowledgement timer in data link layer protocols? The use of acknowledgement timer in data link layer protocols is to resend frames that don’t produce an ACK when sending a frame, schedule a timer to expire at some time after the ACK should have been returned 13. What is meant by Attenuation with respect to signals? In computer networking, attenuation is a loss of signal strength measured in decibels Attenuation occurs on network foe several reasons. Range: Both wireless and wired transmissions gradually dissipate in strength over longer reaches Interference: on wireless networks, radio interference or physical obstruction like walls also dampen communication signals Wire size: on wired networks, thinner wires suffer from higher(more) attenuation than thicker wires 14. Differentiate between flow control and congestion control. Congestion Control basically states that a networks device can transmit only a certain number of packets and cannot add more packets to a network until an acknowledgement is received Fundamentals of Networking (SANJAY HIRANI) Page 21 TRY & TRY U WILL BE SUCCESS Flow control works by refusing new connections until congestion is resolved 15. Briefly explain any two forms of E-Commerce Forms of E-Commerce The various forms of E-Commerce are as follows: Business to business E-Commerce (B2B Ecommerce) Business to Consumer E-Commerce (B2C Ecommerce) Consumer to Business E-Commerce(C2B Ecommerce) Consumer to Consumer E-commerce(C2c Ecommerce) PAPER-5(07-01-2013) 1) Fill in the blanks. I. A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. II. In Go-Back-N ARQ protocol, we can send several frames before receiving acknowledgements, improving the efficiency of transmission. III. Protocols in which stations listen for a carrier and act accordingly are Called Carrier sense protocols. VI. MAC Sub Layer is the basic access method in wireless LANs; stations contend with each other to get access to channel. VII. In CDMA each station is assigned a unique m bit code called Chip Sequence. 2) FHSS: Frequency Hopping Spread Spectrum PAPER-6(09-12-2013) 1. How numbers of required check / redundant bits (r) are decided for a given data bits of size (m) in Hamming Code? 1. What is the drawback of Manchester Encoding technique? The Drawback of Manchester Encoding technique is that the Manchester encoded signal consumes more bandwidth than the original signal. 2. What is frame bursting in Gigabit Ethernet? Frame bursting a sender to transmit a concatenated sequence of multiple frames in a single transmission 4. What is Station keeping in satellite communication? Fundamentals of Networking (SANJAY HIRANI) Page 22 TRY & TRY U WILL BE SUCCESS The effects of solar, lunar, and planetary gravity tend to move them away from their assigned orbit slots and orientations, an effects countered by on-board rocket motors. This fine-tuning activity is called station keeping 3. Define the term cryptanalysis. The art of breaking ciphers is called Cryptanalysis 4. What is the usefulness of timer in data communication? The timer is set to expire after an interval long enough for the frame to reach the destination, be processed there, and have the acknowledgement propagate back to the Sender. 5. Explain following three Domain Resource Records’ types. (a) SOA, (b) CNAME and (c) MX Resource records A DNS Zone database is made up of a collection of resource records. Each resource records specifies information about a particular object. Fundamentals of Networking (SANJAY HIRANI) Page 23